Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
I N D U S T R I A L E S P I O N A G E<br />
Knowledge of Foreign Entity: In the<br />
family model, the “spy” almost certainly<br />
knows the nationality of the foreign entity,<br />
but not necessarily the actual identity of<br />
the final consumer of the information. In<br />
addition, there is no indication yet that the<br />
overseas acquisition manager is required<br />
to use a cutout manager.<br />
Payments <strong>The</strong> record seems to indicate<br />
that in some cases, a significant amount of<br />
money is paid. In other cases, the “service”<br />
is redeemed for privileges given to the extended<br />
family in the home country.<br />
2.3 Use of “Front” Companies &<br />
Organizations<br />
In many cases, the overseas acquisition<br />
manager [or group] engages in setting up<br />
so-called “front” companies in order to provide<br />
a base of operations for their illicit<br />
activities. In many western countries, it is<br />
quite easy to set up a “company”. It requires<br />
only payment of a small registration fee<br />
and a little bit of paperwork.<br />
One famous Russian spy, Richard Sorge,<br />
set up a company in Japan that had imported<br />
technology from Germany capable<br />
of making copies of blueprints. 10 Not only<br />
Russian spy,<br />
Richard Sorge, set<br />
up a company that<br />
had technology<br />
capable of making<br />
copies of<br />
blueprints<br />
was this operation highly profitable, but<br />
at the same time it allowed Sorge & Co.<br />
to make copies of thousands of technical<br />
engineering drawings brought in for copying.<br />
<strong>The</strong> stolen information subsequently<br />
was put on to microfilm, and through a<br />
network of couriers based in Shanghai<br />
found its way to Moscow. 11<br />
Front companies provide a buffer between<br />
the overseas acquisition manager and the<br />
various recruited “spies” supplying the<br />
stolen information. Front companies have<br />
several advantages:<br />
Legitimacy: Since these companies are<br />
incorporated in the same country as the<br />
target company, there is an aura of legitimacy<br />
in their business dealings.<br />
Hidden Ownership: Although these<br />
companies are controlled from overseas,<br />
either<br />
1. Directly from the acquisition agency,<br />
or<br />
2. Through the overseas acquisition manager<br />
[who in turn is directly controlled<br />
from the home country], it is difficult<br />
for the target company to discover<br />
these relationships.<br />
Hidden Control: In many cases, these<br />
front companies are set up in a way in<br />
which although they are in fact conducting<br />
legitimate and real business, the actual control<br />
of them is behind the scenes, exercised<br />
indirectly in a way so that their corporate<br />
leadership itself may not be aware of the<br />
true nature of the business. In this type of<br />
arrangement, the front company serves as a<br />
“shell” or “launching point” for conducting<br />
other operations.<br />
Relationship Complexity: Different<br />
from “consulting companies”, “market research<br />
firms” and other information cockroaches<br />
on the market, front companies are<br />
able to establish with the target company<br />
highly complex relationships and fake negotiations<br />
that are intended only to pump<br />
for information. Examples include:<br />
1. Joint venture discussions.<br />
2. Overseas “sales” relationships.<br />
3. Outsourcing of manufacturing [to the<br />
10<br />
Blueprint: A blueprint is a plan or design documenting an architecture or an engineering design. <strong>The</strong> name comes from the photographic print, obtained through the cyanotype<br />
process, which is composed of white lines on a blue background commonly used in the past for copying architectural plans and engineering drawings. Source: Wikipedia.<br />
11<br />
<strong>The</strong> Sorge network by any standard was one of the most successful operations ever. Not only highly effective, but clever. A somewhat similar operation was carried out by the Israelis<br />
in Switzerland. Technical drawings of the new French Mirage jet fighter aircraft were sent to Israel and used to create the Kfir fighter jet. Only the Israelis did it even better. <strong>The</strong>y<br />
managed to take the originals of the engineering drawings and replace them with copies. <strong>The</strong>re is coverage of this in the book Every Spy a Prince by Raviv and Melman [13].<br />
An <strong>IIPM</strong> Intelligence Unit Publication 31